1. Disconnect the network
When you are unfortunately suffering from a virus intrusion, one thing you can say is to disconnect your network connection to avoid further spread of the virus.
Ii. file backup
Then, you can delete emails with viruses and run anti-virus software to clear them. However, to prevent the virus software from mistakenly killing or deleting documents and important emails that have not been processed, you should first migrate them to other storage media.
Some files with long file names and unprocessed emails must be backed up in Windows. Therefore, we recommend that you do not exit Windows because once a virus attack occurs, you may not be able to access Windows. Regardless of whether these files are infected with viruses, you should back up the files because some viruses are specially designed for a specific anti-virus software and will destroy other files as soon as they are run, therefore, backing up data first is just in case. After removing the virus from the hard disk, you can analyze and process the extra backup files. In addition, you need to back up your important files. It is best to back up your files to other mobile storage devices, such as USB disks, mobile hard disks, and dial-up disks. Try not to use local hard disks to ensure data security.
If you have performed a GHOST backup at ordinary times and used the image file to restore the system, the potential Trojan program will be cleared. Of course, this requires that your GHOST backup is free of viruses.
Iii. Anti-Virus Software
After completing the preparations, shut down the computer and start the machine again. Then, use a clean DOS boot disk to guide the system. In addition, due to viruses, Windows has been damaged by some key files and will frequently perform illegal operations. Therefore, anti-virus software in Windows may not be able to run, so we should prepare a DOS anti-virus software just in case.
Even if you can run anti-virus software in Windows, try to use more than two tools for cross-cleaning. In most cases, Windows may need to be reinstalled, because the virus will damage some files, slowing down the system or causing frequent illegal operations. Because anti-virus software has different development focuses and uses different anti-virus engines, all kinds of anti-virus software have their own strengths and weaknesses, and the cross-use effect is ideal.
The popular anti-virus software is technically improved and can update the virus database in a timely manner. Therefore, the virus you encounter should be within the scope of anti-virus software.
Iv. Security Processing
This includes the username, password, email address, and QQ password used to log on to the network. This prevents hackers from knowing your password during the last intrusion. In addition, because many worms send your information randomly after the attack, it is necessary to make proper changes.
5. Prevent email viruses
In fact, mail viruses are the same as common computer viruses, but they are known as mail viruses because they are mainly transmitted through email. They are usually spread by attachment in the email. You run the virus program in the attachment to expose your computer to viruses. With this in mind, it is not difficult for us to take appropriate measures to prevent it.
The virus is carried in the mail, and the mail is "dead", and the virus will not automatically become active. It may be a virus-infected attachment. If you don't run it, it certainly won't infect your system. Do not open the attachment file from a stranger's letter easily. When you receive funny emails from strangers that are self-explanatory, never open them without thinking. You should be cautious with executable files such as cmd.exe.
For emails sent by a familiar friend, if the email contains attachments, but they are not mentioned or described in the email, do not run it easily. Because some viruses are secretly attached-maybe his computer has been infected, but he does not know it. For example, "Happy 99" is such a virus.
When sending program files or even e-cards to others, you must first confirm that there is no problem and then send it again to avoid being a virus transmitter. In addition, we should avoid blindly forwarding: Some friends can open the address book and forward it to each of their friends when they receive emails that they think are interesting, it is very likely that the virus maker will succeed, and your friends will not doubt the messages you send. As a result, you will become the virus disseminator inadvertently.
Generally, mail viruses are transmitted through attachments. Such as Happy 99 and Mellissa. You will see a virus-infected attachment in the email you received using FoxMail, such as a file named "Happy 99.exe". Don't worry, don't run it, just delete it. Some are macro viruses lurking in Word files, so be careful with attachments in the form of Word files.
Another virus is spread by ActiveX. Some E-mail software such as Outlook can send HTML-format emails, while HTML files can contain ActiveX controls, in some cases, ActiveX can have read and write permissions on your hard disk. Therefore, emails with virus HTML format can be activated when you browse the mail content, however, this is only applicable to HTML-format emails.